work Protocols (ICNP), pages 736–743, Princeton,
NJ, USA.
Baader, F. and Nipkow, T. (1998). Term rewriting and all
that. Cambridge University Press, Great Britain.
Bertolissi, C., Fernandez, M., and Barker, S. (2007). Dy-
namic event-based access control as term rewriting. In
S. Barker and G.J. Ahn, editor, Data and Applications
Security XXI (DBSec), Lecture Notes in Computer
Science 4602, Redondo Beach, CA, USA. Springer,
Berlin, Heidelberg.
Chen, L. and Feng, D. (2007). Dynamic Security Policy for
Credential-based Storage Systems. In International
Conference on Convergence Information Technology),
Gyeongju, South Korea.
Cuppens, F., Cuppens-Boulahia, N., Garcia-Alfaro, J.,
Moataz, T., and Rimasson, X. (2012). Handling State-
ful Firewall Anomalies. In 27th IFIP International
Information Security and Privacy Conference (SEC),
pages 174–186, Heraklion, Crete, Greece.
Elmallah, E. and Gouda, M. G. (2014). Hardness of Fire-
wall Analysis. In Intern. Conf. on NETworked sYS-
tems (NETYS), Marrakesh, Morocco.
Fong, P. (2004). Access control by tracking shallow exe-
cution history. In IEEE Symposium on Security and
Privacy (S&P), Berkeley, CA, USA.
Garcia-Alfaro, J., Cuppens, F., and Cuppens-Boulahia, N.
(2008). Complete Analysis of Configuration Rules to
Guarantee Reliable Network Security Policies. Inter-
national Journal of Information Security, 7(2):103–
122.
Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N.,
Perez, S. M., and Cabot, J. (2013). Management of
Stateful Firewall Misconfiguration. Computers and
Security , 39:64–85.
Hoffman, D. and Yoo, K. (2005). Blowtorch: A Frame-
work for Firewall Test Automation. In Proc. 20th
IEEE/ACM Int. Conf. on Automated Software Engi-
neering (ASE), pages 96–103, Long Beach, Califor-
nia, USA.
Idrees, M., Ayed, S., and Cuppens-Boulahia, N. (2015). Dy-
namic Security Policies Enforcement and Adaptation
Using Aspects. In IEEE Trustcom/BigDataSE/ISPA,
Helsinki, Finland.
Kalam, A. A. E., Baida, R. E., Balbiani, P., Benferhat,
S., Cuppens, F., Deswarte, Y., Mi
`
ege, A., Saurel, C.,
and Trouessin, G. (2003). Organization Based Access
Control. In IEEE 4th International Workshop on Poli-
cies for Distributed Systems and Networks (POLICY),
Lake Come, Italy.
Kamara, S., Fahmy, S., Schultz, E., Kerschbaum, F., and
Frantzen, M. (2003). Analysis of Vulnerabilities in In-
ternet Firewalls. Computers and Security, 22(3):214–
232.
Karoui, K., Ftima, F. B., and Ghezala, H. B. (2013). For-
mal Specification, Verification and Correction of Se-
curity Policies Based on the Decision Tree Approach.
International Journal of Data & Network Security,
3(3):92–111.
Khoumsi, A. and Erradi, M. (2018). Automata-Based
Bottom-Up Design of Confict-Free Policies Specified
as Policy Expressions. In Intern. Conf. on NETworked
sYStems (NETYS), Essaouira, Morocco.
Khoumsi, A., Erradi, M., and Krombi, W. (2018). A Formal
Basis for the Design and Analysis of Firewall Security
Policies. Journal of King Saud University-Computer
and Information Sciences, 30(1):51–66.
Khoumsi, A., Krombi, W., and Erradi, M. (2014). A Formal
Approach to Verify Completeness and Detect Anoma-
lies in Firewall Security Policies. In 7th Intern. Sym-
posium on Foundations & Practice of Security (FPS),
Montreal, Canada.
Kowalski, R. and Sergot, M. (1986). A logic-based calculus
of events. New Gener Comput, 4:67–95.
Krombi, W., Erradi, M., and Khoumsi, A. (2014).
Automata-Based Approach to Design and Analyze
Security Policies. In Intern. Conf. on Privacy, Security
and Trust (PST), Toronto, Canada.
Lee, D. and Yannakakis, M. (1996). Principles and Methods
of Testing Finite State Machines - A Survey. Proceed-
ing of the IEEE, 84:1090–1126.
Ligatti, J., Bauer, L., and Walker, D. (2009). Run-time En-
forcement of Nonsafety Policies. ACM Transactions
on Information and System Security (TISSEC), 12(3).
Liu, A. and Gouda, M. (2008). Diverse Firewall Design.
IEEE Transactions on Parallel and Distributed Sys-
tems, 19(9):1237–1251.
Liu, A. and Gouda, M. (2010). Complete Redundancy
Removal for Packet Classifiers in TCAMs. IEEE
Transactions on Parallel and Distributed Systems,
21(4):424–437.
Liu, A. X. and Gouda, M. G. (2007). Structured Firewall
Design. Computer Networks: The International Jour-
nal of Computer and Telecommunications Network-
ing, 51(4):1106–1120.
Madhuri, M. and Rajesh, K. (2013). Systematic Detection
and Resolution of Firewall Policy Anomalies. Inter-
national Journal of Research in Computer and Com-
munication Technology (IJRCCT), 2(12):1387–1392.
Mallouli, W., Orset, J., Cavalli, A., Cuppens, N., and Cup-
pens, F. (2007). A Formal Approach for Testing Secu-
rity Rules. In 12th ACM symposium on Access control
models and technologies (SACMAT), Sophia Antipo-
lis, France.
Mansmann, F., T. G
¨
obel, and Cheswick, W. (2012). Visual
Analysis of Complex Firewall Configurations. In 9th
International Symposium on Visualization for Cyber
Security (VizSec), pages 1–8, Seattle, WA, USA.
Mayer, A., Wool, A., and Ziskind, E. (2000). Fang: A Fire-
wall Analysis Engine. In Proc. of the IEEE Sympo-
sium on Security and Privacy, pages 177–187, Berke-
ley, California, USA.
Naldurg, P., Campbell, R., and Mickunas, M. (2002). De-
veloping dynamic security policies. In DARPA Active
Networks Conference and Exposition.
Pardo, R., Colombo, C., Pace, G., and Schneider, G. (2016).
An Automata-based Approach to Evolving Privacy
Policies for Social Networks. In International Con-
ference on Runtime Verification (RV 2016), Madrid,
Spain.
ICISSP 2023 - 9th International Conference on Information Systems Security and Privacy
226